Read Seizing the Enigma Online

Authors: David Kahn

Seizing the Enigma (18 page)

BOOK: Seizing the Enigma
5.53Mb size Format: txt, pdf, ePub
ads

On September 3, Turing, in his room at Cambridge, heard Chamberlain intone on the wireless that the expiration of Britain’s ultimatum to Hitler to withdraw his forces from Poland meant that Britain was at war with Germany. The next day, he reported to Bletchley, where he joined Knox, Twinn, and a Cambridge mathematician, John R. F. Jeffreys, in working on the Enigma. He found, as Twinn and Jeffreys had before him, that the continuing recovery of the Enigma keys was being achieved mainly by bright ideas, not by mathematics. It was, however, mathematicians who were having the ideas, thus at least partially vindicating Denniston’s faith.

The most important breakthrough, an idea of Turing’s, came late in 1939. It dealt with the Polish mechanism for testing for possible Enigma keys, the bombe, which the Poles had displayed to Knox at the July meeting in Warsaw but whose technical description had not arrived in England until August 16, just three weeks before Turing came to Bletchley. Turing was especially well equipped to work on this electromechanical device, for, though most of his work was theoretical, he was mechanically apt. He had once made an electric multiplier (for use in a cipher system he invented), machining and winding some of the relays himself, and had later designed a mechanism to answer a problem dealing with prime numbers, cutting some of the gears himself.

Turing had reached some of his most important conclusions by eliminating results that led to self-contradictions. If the
Entscheidungsproblem
can be solved, he had written, “then there is a general (mechanical) process for determining whether U
n
(
M
) is provable. By Lemmas 1 and 2, this implies that there is a process for determining whether M ever prints 0 and this is impossible, by §8. Hence the
Entscheidungsproblem
cannot be solved.” He now applied the same sort of thinking to the Enigma.

He recognized that the Polish machine helped to identify keys by asking, in mathematical terms, whether the enciphered message keys of the cryptogram were consistent with the unknown basic setting that was wanted. The bombe actually did this by rejecting the thousands of inconsistencies and leaving the few noncontradictory situations to be tested to see whether their settings yielded German when applied to the intercepts. Turing advanced this testing method by a giant step.

A basic technique in cryptanalysis is that of the probable word. The cryptanalyst guesses that a particular word or phrase exists in the plaintext of a cryptogram—perhaps “enemy” or “attack” in a message transmitted after a military unit has been under assault—and employs it as a wedge to recover the full text and possibly the key
of the cryptogram. The Poles had used this method in a limited area before they had bombes: to reduce the number of trials in finding the positions of the alphabet rings on the rotors, they assumed that the German military message they were attacking began with
An
, or “To,” followed by the letter
X
, which separated words. Turing shifted the focus of this technique and endowed it with vast new power. He matched a probable word or phrase (longer than
AnX
) to a portion of an intercept and tested whether any rotor position allowed such an encipherment. He moved, in other words, from speeding the recovery of keys by finding noncontradictory links between the known and the assumed keys to speeding the recovery of keys by finding noncontradictory links between assumed plaintext and assumed keys.

His bombe did this by adding to the multiplicity of Enigma replicas a test register, a set of twenty-six relays. At each of the successive rotor positions the bombe was running through, this test register looked at the voltage at each of the twenty-six points equivalent to the output lights of the Enigma’s illuminable panel. Two conditions—voltage appearing at all twenty-six points or at all but one—represented a noncontradiction between the assumed plaintext and the then position of the rotors. This position thus constituted a possible key, and clerks would see if it produced German plaintext. If it did not, the bombe would be restarted.

The work began with cryptanalysts imagining the possible plaintext of a message, which they called a crib. They made these guesses on the basis of their knowledge of German communications, gained through direction-finding, radiomen’s chatter, service messages, plaintext intercepts, solutions of simpler systems, captured documents, prisoner interrogations, and previous Enigma solutions that used other principles. Suppose they learned that a Luftwaffe headquarters sent a report every day at 4
P.M
. to the general of reconnaissance; they could guess that its messages started
Dem General der Aufklaerungsflieger.
A navy communications outpost was ordered to report every day to a central radio post the strength at which the signal was being received.
An army unit repeatedly transmitted
Nichts zu melden
(“Nothing to report”).

The crib would be set letter for letter above the ciphertext. The cryptanalyst then sought a loop: letters in the assumed plaintext and in the ciphertext that could be chained together, eventually linking the first letter to the last. For example,

links the
m
in the upper line to the E below, one of the
e
’s above to an L below, and an
l
above to an M below, thus forming the loop M E L M. The bombe was set up in the basic position, with rotors I, II, and III, in that order, set at A A A. (The ring positions were ignored, and the cryptanalyst hoped that the middle rotor would not step within the crib.) The plugboard positions were as unknown as the rotor order and position.

Voltage was then applied to the bombe position representing one of the twenty-six possible plugboard substitutions for the first letter of the crib. It went through the bombe’s rotor array, into and back out through the reflecting rotor, back through the rotor array, then into the rotor array that was testing the second plain-cipher pair of the loop and was advanced by the number of places by which the first and second pairs differed in the text: the E-L pair in the crib is two places further on than M-E, so the rightmost, or fast, rotor of the second array has to be two clicks beyond the fast rotor of the first array. The voltage emerged from this array to pass through a third and then loop back into the first.

As it did so, the voltage passed through the test register. Suppose that the arrangement of rotors was correct and the choice of plugboard substitutions was correct. The voltage would make a single circuit through the rotors and show up at only one test point—one of the two conditions for a correct match. The relay would electromechanically
interrupt the power to the bombe and stop it, enabling the cryptanalysts to ascertain this rotor position and use it to decipher the cryptogram to see if German plaintext appeared. Because of the plugboard, the test decipherment would include many cipher substitutes for plaintext letters, but it should retain enough of a German appearance to test its validity. The cryptanalyst would have to recover the plaintext by solution.

Suppose, however, that the arrangement of rotors was wrong. The voltage would pass through the first rotor array, come out at a letter that would not complete a loop, enter the second rotor at a non-loop point, pass through it, and emerge again at a nonloop letter that would send it into a third rotor array. The voltage would continue its errant course through the bombe’s several rotor arrays—as many as letters in the crib—nearly always emerging at all twenty-six letters and putting voltage on all twenty-six relays of the test register. But this is not one of the patterns that would stop the machine. So the bombe would continue to run, searching for a position at which to stop. Suppose, finally, that the arrangement of rotors was correct but the choice of plugboard substitution was not. In this case, the voltage would spread out among the test pins, as in the case of an incorrect rotor arrangement, but would not be able to enter the one correct test pin. This would produce the second, more likely, correct condition, with voltage to all test relays except one, and the bombe would stop.

Turing’s method had two advantages over the Poles’. It liberated the cryptanalysts from the need to find special conditions among the message keys, namely, the repeated letters in certain positions that the Polish cryptanalysts had called females. And it could look for help in the vast ranges of human endeavor distilled by messages, thus improving the chances that a message would be solved and increasing the volume of solutions.

But the method had not reached its full potential. A way of doing that was discovered totally unexpectedly by another Cambridge mathematician, Gordon Welchman. A chess player, but not a very good one,
and a tennis player, even worse, he was a sturdily built man of thirty-four, of medium height with very pink cheeks, wavy hair, and dashing good looks. But he was austere and reserved and was regarded even by his friends as “a solemn old stick, without a great sense of humor.” Welchman had attended Trinity College, Cambridge, on a mathematics scholarship and after his 1928 graduation had taught mathematics at another Cambridge college, Sidney Sussex. He specialized in algebraic geometry.

Like Turing, Welchman had attended the introductory course in cryptology and had reported to Bletchley Park upon the outbreak of war. Denniston sent him to the Cottage, where he joined the group working on the Enigma under Knox. Welchman soon got the impression that Knox didn’t like him—indeed, he soon concluded that Knox didn’t like most people—and within a couple of weeks he had been exiled to another building, Elmers School, with another assignment. He was to study the externals of the intercepted German army messages—the radio frequencies on which they were sent, their call signs, message indicators, signatures, and addresses—to deduce what information he could from any patterns he found. To help with this, he was given a sheaf of solved Enigma intercepts.

Welchman quickly perceived that the traffic patterns reflected the organization of the German army. “The call signs came alive,” he said, “as representing elements of those forces whose commanders at various echelons would have to send messages to each other. The use of different keys … suggested different command structures.” He was independently inventing a form of intelligence called traffic analysis. He rapidly perceived the stereotyped nature of many of the addresses, text beginnings, and even whole messages, and wondered whether they could not be used as cribs. He was reinventing Turing’s method of ascertaining a valid key. And, quickly spotting many of the same patterns and characteristics in the message indicators that Rejewski and his colleagues had found, he proposed using perforated sheets to narrow down the possible rotor orders and ring settings. He
was reinventing the Zygalski sheets, which had, unknown to him, been adopted by G.C.&C.S. and named Jeffreys sheets after John Jeffreys, who was in charge of preparing them.

But Welchman, who had independently duplicated two of the most important ideas of Enigma cryptanalysis and one of the fundamentals of radio intelligence, was not doomed always to walk in the shadow of others. Before the war was three months old, his brilliance augmented the power of Turing’s bombe and greatly accelerated the pace of Enigma solutions.

His method was based on the fact that Enigma substitutions were reciprocal. If plaintext
r
became ciphertext P at a particular rotor order and position and with particular plugboard connections, then plaintext
p
would become ciphertext R at the same setting. Welchman employed this principle to exploit the letters of a crib that did not form part of a loop. He set out, on a wooden board, a square array of 676 contacts lettered A to Z across the top and A to Z down the side. Then he connected by wires the contact in, say, row D and column F to the contact in row F and column D. All 676 contacts were thus wired. As a consequence, when the crib gave plaintext
p
and ciphertext R, the diagonal board automatically sent the voltage for ciphertext P and plaintext
r
through the rotor arrays. This reduced the number of erroneous stops.

Once Turing had sketched out the plan for his bombe, Commander Edward Travis, the bulldoglike deputy head of G.C.&C.S., began discussions with the British Tabulating Machine Company. The company named as its representative Harold (Doc) Keen, a friendly, talkative engineer who had often visited the International Business Machines Corporation in the United States. At one meeting, at the White Hart Pub in Buckingham, Peter Twinn summarized the concept to Keen by saying that what was needed was a machine like forty Enigmas in a row. Keen also rapidly grasped Welchman’s idea and incorporated the diagonal board into the British bombes. The main frame was about 4 feet wide and as tall as a man; it was supported
on short legs that rolled on casters. Each bombe consisted of the equivalent of twelve Enigma machines (the two prototypes had only ten) plus a diagonal board. The face of each bombe was divided into six stacks of two horizontal rectangles; in each rectangle were mounted three wired wheels, each about 5 inches across. They emulated Enigma rotors but differed from them in that the current flowed not through them but across them: from an outer ring of contacts to an inner ring, both on the face plate of the bombe. Each vertical set of three rotors represented an Enigma with a different rotor choice and order. Five bombes would thus represent all sixty rotor possibilities. The wheels stepped as did the rotors, except that the lack of knowledge of the ring position introduced discrepancies that caused some accurate crib superimpositions to be rejected as not possible.

BOOK: Seizing the Enigma
5.53Mb size Format: txt, pdf, ePub
ads

Other books

Body of Water by Stuart Wakefield
11 Hanging by a Hair by Nancy J. Cohen
The Queene's Cure by Karen Harper
Midnight Exposure by Leigh, Melinda
Angels by Reba White Williams


readsbookonline.com Copyright 2016 - 2024